About
383
Publications
436,838
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
24,435
Citations
Citations since 2017
Introduction
Additional affiliations
January 2000 - September 2015
September 1989 - January 1990
August 1978 - May 1983
Publications
Publications (383)
A fundamental underpinning of all social relationships is trust. Trust can be established through implicit forms of communication called relational messages. A multidisciplinary, multi-university, cross-cultural investigation addressed how these message themes are expressed and whether they are moderated by culture and veracity. A multi-round decis...
This investigation sought to find the relationships among multiple dimensions of personality and multiple features of language style. Unlike previous investigations, after controlling for such other moderators as culture and socio-demographics, the current investigation explored those dimensions of naturalistic spoken language that most closely ali...
Social relationships are constructed by and through the relational communication that people exchange. Relational messages are implicit nonverbal and verbal messages that signal how people regard one another and define their interpersonal relationships-equal or unequal, affectionate or hostile, inclusive or exclusive, similar or dissimilar, and so...
Trust between group members has many implications for how well a group performs. In this study, we predict perceived trustworthiness of group members when there are subversive group members. We collected multimodal verbal and non-verbal data from a group interaction experiment. During the interaction, we periodically surveyed the group members abou...
This study examines the joint impact of modality interactivity and deception on the quality of group communication and subsequent group outcomes. Communication quality was examined as three meta-dimensions of relational communication, interactional communication, and task communication qualities. Results from two experiments indicated that audio co...
This prelude to the Socio-Cultural Attitudinal Networks project, funded by the U.S. Army Research Office Multi-University Research Initiative, introduces the concept of relational communication and its relationship to interpersonal deception. The research protocol is described wherein groups of interactants engaged in a multi-round game of Resistan...
The majority of deception research to date has focused on deception in the context of dyadic communication. Among this body of research are efforts to identify what signals can be used to discriminate deceivers from non-deceivers. The general form of this research involves observing (typically recording to observe and/or manually code after the fac...
The literature on indicators of deception is extensive, yet few rigorous investigations have documented the deceptive communication behavior associated with culture. Notwithstanding, culture can play a profound role in affecting the emotional and cognitive factors that are theorized to differentiate behavioral patterns between deceivers and truth-t...
In this study, we address a cross-domain problem of applying computer vision approaches to reason about human facial behavior when people play The Resistance game. To capture the facial behaviors, we first collect several hours of video where the participants playing The Resistance game assume the roles of deceivers (spies) vs truth-tellers (villag...
Trust is an integral part of interpersonal relationships. Achieving trust is a goal in most relationships, although there are occasions when wariness and distrust are warranted instead. This chapter presents a new model of trust called the “Spiral Model of Trust” which incorporates concepts from a wide range of disciplinary perspectives. The theory...
Power is an integral part of group dynamics and when deception is involved, it affects the process of group decision-making as well as the outcomes of those decisions. We examined 95 groups playing a popular party card game called Mafia in which some players were randomly assigned the role of Spies, and others, the role of Villagers. Spies conceale...
Adversarial group negotiations often involve contentious strategies such as deception and dominance. Understanding characteristics of language and voice associated with deception and dominance helps negotiators identify the use of these strategies and achieve higher self-interests in various use cases, including business negotiations and law enforc...
Nonverbal signals color the meanings of interpersonal relationships. Humans rely on facial, head, postural, and vocal signals to express relational messages along continua. Three of relevance are dominance-submission, composure-nervousness and trust-distrust. Machine learning and new automated analysis tools are making possible a deeper understandi...
In this paper, we approach the problem of deception detection in videos. Current approaches are limited since they (i) are used in short videos focusing only on a small act of deception, (ii) are hard to interpret, and (iii) do not make use of any human model that could help them in the detection task. To address those limitations, we propose a nov...
This book analyzes the multimodal verbal and nonverbal behavior of humans in both an artificial game, based on the well-known Mafia and Resistance games, as well as selected other settings. This book develops statistical results linking different types of facial expressions (e.g. smile, pursed lips, raised eyebrows), vocal features (e.g., pitch, lo...
Deception is an unfortunate staple in group work. Guarding against team members’ deceptive tactics and alternative agendas is difficult and may seem even more difficult in technology-driven business environments that have made multitasking during teamwork increasingly commonplace. This research develops a foundation for a nuanced theoretical unders...
Denault, V., Plusquellec, P., Jupe, L. M., St-Yves, M., Dunbar, N. E., Hartwig, M., … van Koppen, P. J. (2020). L’analyse de la communication non verbale: Les dangers de la pseudoscience en contextes de sécurité et de justice [The analysis of nonverbal communication: The dangers of pseudoscience in security and justice contexts]. Revue internationa...
This paper discusses the advantages of using posturographic signals from force plates for non-invasive credibility assessment. The contributions of our work are two fold: first, the proposed method is highly efficient and non invasive. Second, feasibility for creating an autonomous credibility assessment system using machine-learning algorithms is...
This chapter presents results of an original interactive experiment in which truthful or deceptive interviewees were highly motivated (or not) and interviewed in one of three interaction modalities: face-to-face, audio, or text. Participants committed or observed a mock crime and then were interviewed by trained interviewers. Motivated interviewees...
For security and justice professionals (e.g., police officers, lawyers, judges), the thousands of peer-reviewed articles on nonverbal communication represent important sources of knowledge. However, despite the scope of the scientific work carried out on this subject, professionals can turn to programs, methods, and approaches that fail to reflect...
Para los profesionales de la seguridad y la justicia (policías, abogados, jueces), los miles de artículos revisados por pares sobre comunicación no verbal representan fuentes importantes de conocimiento. Sin embargo, a pesar del alcance del trabajo científico realizado sobre este tema, los profesionales pueden recurrir a programas, métodos y enfoqu...
We consider the problems of predicting (i) the most dominant person in a group of people, and (ii) the more dominant of a pair of people, from videos depicting group interactions. We introduce a novel family of variables called Dominance Rank. We combine features not previously used for dominance prediction (e.g., facial action units, emotions), wi...
Most work on automated deception detection (ADD) in video has two restrictions: (i) it focuses on a video of one person, and (ii) it focuses on a single act of deception in a one or two minute video. In this paper, we propose a new ADD framework which captures long term deception in a group setting. We study deception in the well-known Resistance g...
Many deception studies focus on interviewees who do not confess to wrongdoing; confessions are often treated as anomalies and ignored. This study begins to explore confessions by using a mixed-methods secondary analysis of verbal and nonverbal cues that accompany confessions about wrongdoing. Confederates encouraged participants to cheat for extra...
Ample scientific research has confirmed significant linguistic differences between truthful and deceptive discourse in both laboratory and field experiments. That literature is reviewed, followed by presentation of an experiment that tested the effects of veracity on a wide array of linguistic indicators and tested which effects were moderated by m...
Cambridge Core - Communications - The Cambridge Handbook of Group Interaction Analysis - edited by Elisabeth Brauner
An Embodied Conversational Agent-based human deception detection system was tested in a laboratory experiment during which some subjects had committed a mock crime and had guilty knowledge of that crime. Sensor signals were analyzed for their ability to discriminate between guilty/deceptive and innocent/truthful examinees and suitability for conduc...
This study investigates the development of an automated interviewing system that uses facial behavior as an indicator of the risk of given illicit behavior. Traditional facial emotion indicators of risk in semistructured dialogue may have limitations in an automated approach. However, an initial analysis of mock crime interviews suggests that the f...
One of the benefits of using digital games for education is that games can provide feedback for learners to assess their situation and correct their mistakes. We conducted two studies to examine the effectiveness of different feedback design (timing, duration, repeats, and feedback source) in a serious game designed to teach learners about cognitiv...
Social Signal Processing is the first book to cover all aspects of the modeling, automated detection, analysis, and synthesis of nonverbal behavior in human-human and human-machine interactions. Authoritative surveys address conceptual foundations, machine analysis and synthesis of social signal processing, and applications. Foundational topics inc...
Social Signal Processing is the first book to cover all aspects of the modeling, automated detection, analysis, and synthesis of nonverbal behavior in human-human and human-machine interactions. Authoritative surveys address conceptual foundations, machine analysis and synthesis of social signal processing, and applications. Foundational topics inc...
Rapid Judgments (RJs) are quick assessments based on indirect verbal and nonverbal cues that are known to be associated with deception. RJs are advantageous because they eliminate the need for expensive detection equipment and only require minimal training for coders with relatively accurate judgments. Results of testing on two different datasets s...
Objective. Humans systematically make poor decisions because of cognitive biases. Can digital games train people to avoid cognitive biases? The goal of this study is to investigate the affordance of different educational media in training people about cognitive biases and to mitigate cognitive biases within their decision-making processes.
Method....
Because userstreatembodiedagents(EAs)associalactors,usersholdexpectationsabouthuman-to-EA
communication (HtEAC)similartothoseinhuman-to-humancommunication.Thisstudyextends
Expectancy ViolationsTheory(EVT)toexaminehowdifferentformsofinterfacesthatconfirm orviolate
user expectationsaffectthecommunicationprocess,socialjudgments,abilitytoinfluence, and...
Eye-tracking technology has exhibited promise for identifying deception in automated screening systems. Prior deception research using eye trackers has focused on the detection and interpretation of brief oculometric variations in response to stimuli (e.g., specific images or interview questions). However, more research is needed to understand how...
Digital games are ideal for training complex decision making skills because they allow players to experience decision making processes and consequences. However, training complex skills often results in failure, which may undermine learning engagement. Traditional training methods employing observational learning (e.g., training videos) do not caus...
We are constantly forming impressions about those around us. Social interaction depends on our understanding of interpersonal behavior - assessing one another's personality, emotions, thoughts and feelings, attitudes, deceptiveness, group memberships, and other personal characteristics through facial expressions, body language, voice and spoken lan...
Interpersonal deception is a dynamic process in which participating individuals adjust and adapt their behaviors as the deception proceeds. Using THEME, we demonstrate that deceptive communication in group settings is highly patterned. We further examine patterning behavior using the strategy-focused lens of Interpersonal Deception Theory (Buller a...
Drawing significantly on both classic and contemporary research, Nonverbal Communication speaks to today's students with modern examples that illustrate nonverbal communication in their lived experiences. This new edition, authored by three of the foremost scholars in nonverbal communication, builds on the approach pioneered by Burgoon, Buller and...
A thorough look at the different research applications of temporal pattern detection and analysis using specially developed software, THEME (TM). The T-system is a model for discovering hidden recurring patterns in observable behavior and can be useful to researchers in neuroscience, psychology, biology, robotics, finance, medicine, and many other...
Deception is thought to be more effortful than telling the truth. Empirical evidence from many quarters supports this general proposition. However, there are many factors that qualify and even reverse this pattern. Guided by a communication perspective, I present a baker's dozen of moderators that may alter the degree of cognitive difficulty associ...
Interpersonal deception theory (IDT) explains the process and outcomes of deception in interpersonal conversations. It focuses on intentional, strategic communication behaviors by interacting senders and receivers in conversations, as well as the involuntary behavior that arises from their affective reactions and cognitions. Articulated are its cor...
This paper discusses the advantages of using posturographic signals from force plates for non-invasive credibility assessment. The contributions of our work are two fold: first, the proposed method is highly efficient and non invasive. Second, feasibility for creating an autonomous credibility assessment system using machine-learning algorithms is...
Expectancy violations theory predicts and explains the effects of nonverbal behavior violations on interpersonal communication outcomes such as attraction, credibility, persuasion, and smooth interactions. Human interactions are strongly governed by expectations which, if violated, are arousing and trigger an appraisal process that may be moderated...
Deception detection accuracy concerns the ability of instruments or humans to distinguish truthful from deceptive communication. Accuracy is often described in terms of signal detection theory (hits, the percentage of actual deceptive utterances that are accurately classified as deceit; misses, the percentage of actual deception that is erroneously...
Quarterly conference calls where corporate executives discuss earnings that are later found to be misreported offer an excellent test bed for determining if automated linguistic and vocalic analysis tools can identify potentially fraudulent utterances in prepared versus unscripted remarks. Earnings conference calls from one company that restated th...
High-stakes lying causes detectable changes in human behavior and physiology. Lie detection techniques based on behavior analysis are unobtrusive, but often require laborintensive efforts. Lie detection techniques based on physiological measurements are more amenable to automated analysis and perhaps more objective, but their often obtrusive nature...
Levine, Clare, Green, Serota and Park (2014) present studies intended to demonstrate that the Park–Levine probability model (PLM) better accounts for accuracy in detecting interactive deception than interpersonal deception theory (IDT). This rejoinder makes 6 points: (a) the PLM is a description not an explanation; (b) IDT and its empirical support...
Screening individuals for concealed information has traditionally been the purview of professional interrogators investigating crimes. However, the ability to detect when a person is hiding important information has high value in many other applications if results could be reliably obtained using an automated and rapid interviewing system. Unfortun...
Interpersonal adaptation is a fundamental and pervasive human behavior. Adaptation forms the basis of social and biological development; it enables relationship development, facilitates social influence, marks personality and cultural differences, and is critical to establishing and maintaining social organization. The term “adaptation” encompasses...
Accurate deception detection is a desirable goal with many applications including credibility assessment, security screening, counter-terrorism, and homeland security. However, many deception detection methodologies involve intrusive sensors or other limitations that preclude their use in a covert manner. Posturography may overcome these limitation...